The BlackCat ransomware (aka ALPHV) isn't showing any signs of slowing down, and the latest example of its evolution is a new version of the gang's data exfiltration tool used for double-extortion ...
A data exfiltration breach reported by Sea Mar Community Health Centers affected 688,000 current and past patients. Two recent hacking incidents - one involving ransomware and the other involving the ...
Generative AI is raising the risk of dangling DNS attack vectors, as the orphaned resources are no longer just a phishing nuisance. When a company shuts down a testing environment, AWS bucket, an ...
The free online office suite software is used by more than 30 million people and is a ripe target for criminals. An extremely high number of keylogger phishing campaigns have been seen tied to the ...
Data leaks are a serious concern for companies of all sizes; if one occurs, it may put them out of business permanently. Here’s how you can protect your organization from data theft. In today’s ...
Ransomware’s popularity continues to skyrocket, due to its successful business model and the significant profit paid by its victims. Unlike other malware business models, based on Darknet sales, ...
Data loss prevention solutions have become an important tool in the chief information security officer’s toolbox with the rise in popularity of generative artificial intelligence in the enterprise.
Software-based network isolation provided by routers is not as efficient as believed, as hackers can smuggle data between the networks for exfiltration. Most modern routers offer the possibility to ...
The stakes have never been higher for accounting firms. As custodians of sensitive financial data, tax returns, payroll records and audit reports, these businesses are prime targets for a rapidly ...
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results